Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correcting adjacent errors using permutation code trees., , and . AFRICON, page 1-5. IEEE, (2011)Frequency optimization for narrowband power-line communications., , and . AFRICON, page 1-6. IEEE, (2013)A Semi-hidden Markov modeling of a low complexity FSK-OOK in-house PLC and VLC integration., , , , , and . ISPLC, page 199-204. IEEE, (2015)Moment balancing templates: constructions to add insertion/deletion correction capability to error correcting or constrained codes., , , , and . IEEE Trans. Inf. Theory, 55 (8): 3494-3500 (2009)A Multilevel Construction for Mappings from Binary Sequences to Permutation Sequences., and . ISIT, page 1895-1899. IEEE, (2006)Construction of q-ary constant weight sequences using a knuth-like approach., and . ISIT, page 2028-2032. IEEE, (2017)On the distance optimality of permutation mappings., , and . ISIT, page 1068-1072. IEEE, (2005)Construction of Efficient q-ary Balanced Codes., and . AFRICON, page 1-6. IEEE, (2019)Permutation trellis codes., , , and . IEEE Trans. Commun., 53 (11): 1782-1789 (2005)A Neural Network Ensemble With Feature Engineering for Improved Credit Card Fraud Detection., , , , and . IEEE Access, (2022)